Huawei EulerOS: Security Advisory for rpm. It was found that rpm uses temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation
Reporter | Title | Published | Views | Family All 116 |
---|---|---|---|---|
![]() | Privilege escalation | 22 Nov 201722:29 | – | prion |
![]() | Race condition | 25 Aug 202220:15 | – | prion |
![]() | Design/Logic Flaw | 26 Aug 202216:15 | – | prion |
![]() | EulerOS 2.0 SP3 : rpm (EulerOS-SA-2019-1043) | 15 Feb 201900:00 | – | nessus |
![]() | EulerOS Virtualization for ARM 64 3.0.2.0 : rpm (EulerOS-SA-2019-1616) | 30 May 201900:00 | – | nessus |
![]() | EulerOS 2.0 SP5 : rpm (EulerOS-SA-2019-1011) | 8 Jan 201900:00 | – | nessus |
![]() | EulerOS Virtualization 3.0.1.0 : rpm (EulerOS-SA-2019-1466) | 14 May 201900:00 | – | nessus |
![]() | EulerOS Virtualization 2.5.4 : rpm (EulerOS-SA-2019-1210) | 9 Apr 201900:00 | – | nessus |
![]() | EulerOS 2.0 SP2 : rpm (EulerOS-SA-2018-1353) | 6 Nov 201800:00 | – | nessus |
![]() | Photon OS 1.0: Rpm PHSA-2017-1.0-0095 | 7 Feb 201900:00 | – | nessus |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2019.1466");
script_cve_id("CVE-2017-7501");
script_tag(name:"creation_date", value:"2020-01-23 11:48:15 +0000 (Thu, 23 Jan 2020)");
script_version("2024-02-05T14:36:56+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:56 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"4.6");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:P/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2017-12-12 17:43:29 +0000 (Tue, 12 Dec 2017)");
script_name("Huawei EulerOS: Security Advisory for rpm (EulerOS-SA-2019-1466)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROSVIRT\-3\.0\.1\.0");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2019-1466");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2019-1466");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'rpm' package(s) announced via the EulerOS-SA-2019-1466 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"It was found that rpm uses temporary files with predictable names when installing an RPM. An attacker with ability to write in a directory where files will be installed could create symbolic links to an arbitrary location and modify content, and possibly permissions to arbitrary files, which could be used for denial of service or possibly privilege escalation.(CVE-2017-7501)");
script_tag(name:"affected", value:"'rpm' package(s) on Huawei EulerOS Virtualization 3.0.1.0.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROSVIRT-3.0.1.0") {
if(!isnull(res = isrpmvuln(pkg:"rpm", rpm:"rpm~4.11.3~32.h6", rls:"EULEROSVIRT-3.0.1.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"rpm-build", rpm:"rpm-build~4.11.3~32.h6", rls:"EULEROSVIRT-3.0.1.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"rpm-build-libs", rpm:"rpm-build-libs~4.11.3~32.h6", rls:"EULEROSVIRT-3.0.1.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"rpm-libs", rpm:"rpm-libs~4.11.3~32.h6", rls:"EULEROSVIRT-3.0.1.0"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"rpm-python", rpm:"rpm-python~4.11.3~32.h6", rls:"EULEROSVIRT-3.0.1.0"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo